{"title":"The PACE|CA Protocol for Machine Readable Travel Documents","authors":"Jens Bender, M. Fischlin, D. Kügler","doi":"10.1007/978-3-319-03491-1_2","DOIUrl":"https://doi.org/10.1007/978-3-319-03491-1_2","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130710463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leanid Krautsevich, A. Lazouski, F. Martinelli, A. Yautsiukhin
{"title":"Towards Policy Engineering for Attribute-Based Access Control","authors":"Leanid Krautsevich, A. Lazouski, F. Martinelli, A. Yautsiukhin","doi":"10.1007/978-3-319-03491-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-03491-1_6","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133273666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Martinelli, I. Matteucci, A. Saracino, D. Sgandurra
{"title":"Remote Policy Enforcement for Trusted Application Execution in Mobile Environments","authors":"F. Martinelli, I. Matteucci, A. Saracino, D. Sgandurra","doi":"10.1007/978-3-319-03491-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-03491-1_5","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124316577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Velten, Sascha Wessel, F. Stumpf, C. Eckert
{"title":"Active File Integrity Monitoring Using Paravirtualized Filesystems","authors":"Michael Velten, Sascha Wessel, F. Stumpf, C. Eckert","doi":"10.1007/978-3-319-03491-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-03491-1_4","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132970706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification","authors":"Jiun Yi Yap, A. Tomlinson","doi":"10.1007/978-3-319-03491-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-03491-1_1","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Implementation of Asynchronous Method Calls and Futures","authors":"Peeter Laud","doi":"10.1007/978-3-642-35371-0_3","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_3","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129655455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Analysis of Security Properties of the TPM","authors":"M. Ryan","doi":"10.1007/978-3-642-35371-0_1","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_1","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131299994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Krzywiecki, Przemyslaw Kubiak, Mirosław Kutyłowski
{"title":"Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees","authors":"L. Krzywiecki, Przemyslaw Kubiak, Mirosław Kutyłowski","doi":"10.1007/978-3-642-35371-0_2","DOIUrl":"https://doi.org/10.1007/978-3-642-35371-0_2","url":null,"abstract":"","PeriodicalId":258735,"journal":{"name":"International Conference on Trusted Systems","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129477570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}